Active Directory
database, 19
schema design, 19
Advanced Encryption Standard (AES), 61–64
Advanced persistent threat (APT), 45
Apache, 21
Application security, 51–56
environment, 53–54
migration, 53–54
secure developer, need for, 51–52
test data, 53–54
testing applications, 54–55
using data and networks, 53
Asset sensitivity, 74
Asymmetric ciphers, encryption in, 61
Availability.See CIA model
Berkeley Software Distribution (BSD), 20
Black-hat hackers, 69
Get Information Technology Security Fundamentals now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.